必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.34.173.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.34.173.48.			IN	A

;; AUTHORITY SECTION:
.			581	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:40:20 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
48.173.34.120.in-addr.arpa domain name pointer 48.173.34.120.broad.zz.fj.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.173.34.120.in-addr.arpa	name = 48.173.34.120.broad.zz.fj.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.237.255.248 attackbots
Port 22 Scan, PTR: None
2020-08-14 06:00:37
45.173.4.82 attack
Unauthorized connection attempt from IP address 45.173.4.82 on Port 445(SMB)
2020-08-14 05:40:02
200.116.209.114 attackbotsspam
Unauthorized connection attempt from IP address 200.116.209.114 on Port 445(SMB)
2020-08-14 05:33:07
113.173.76.82 attackspam
Unauthorized connection attempt from IP address 113.173.76.82 on Port 445(SMB)
2020-08-14 05:39:37
151.233.146.90 attackbots
Unauthorized connection attempt from IP address 151.233.146.90 on Port 445(SMB)
2020-08-14 05:41:09
60.167.189.120 attackspambots
Aug 12 16:36:57 zimbra sshd[5944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.189.120  user=r.r
Aug 12 16:36:58 zimbra sshd[5944]: Failed password for r.r from 60.167.189.120 port 56907 ssh2
Aug 12 16:36:58 zimbra sshd[5944]: Received disconnect from 60.167.189.120 port 56907:11: Bye Bye [preauth]
Aug 12 16:36:58 zimbra sshd[5944]: Disconnected from 60.167.189.120 port 56907 [preauth]
Aug 12 16:45:50 zimbra sshd[12431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.189.120  user=r.r
Aug 12 16:45:52 zimbra sshd[12431]: Failed password for r.r from 60.167.189.120 port 59565 ssh2
Aug 12 16:45:53 zimbra sshd[12431]: Received disconnect from 60.167.189.120 port 59565:11: Bye Bye [preauth]
Aug 12 16:45:53 zimbra sshd[12431]: Disconnected from 60.167.189.120 port 59565 [preauth]
Aug 12 16:49:44 zimbra sshd[15430]: Received disconnect from 60.167.189.120 port 43697:11: Bye Bye [........
-------------------------------
2020-08-14 05:55:02
186.90.214.142 attackspam
Unauthorized connection attempt from IP address 186.90.214.142 on Port 445(SMB)
2020-08-14 05:45:48
37.59.55.14 attackspam
Aug 13 23:28:56 piServer sshd[13812]: Failed password for root from 37.59.55.14 port 50648 ssh2
Aug 13 23:31:32 piServer sshd[14044]: Failed password for root from 37.59.55.14 port 45619 ssh2
...
2020-08-14 05:35:13
222.186.175.167 attackspambots
Aug 13 22:03:38 rush sshd[9323]: Failed password for root from 222.186.175.167 port 24954 ssh2
Aug 13 22:03:42 rush sshd[9323]: Failed password for root from 222.186.175.167 port 24954 ssh2
Aug 13 22:03:45 rush sshd[9323]: Failed password for root from 222.186.175.167 port 24954 ssh2
Aug 13 22:03:49 rush sshd[9323]: Failed password for root from 222.186.175.167 port 24954 ssh2
...
2020-08-14 06:05:14
1.34.72.81 attackbots
Attempted connection to port 23.
2020-08-14 06:03:17
157.245.207.191 attackbots
Aug 13 23:38:27 lukav-desktop sshd\[4080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.191  user=root
Aug 13 23:38:28 lukav-desktop sshd\[4080\]: Failed password for root from 157.245.207.191 port 37970 ssh2
Aug 13 23:42:06 lukav-desktop sshd\[6291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.191  user=root
Aug 13 23:42:08 lukav-desktop sshd\[6291\]: Failed password for root from 157.245.207.191 port 39656 ssh2
Aug 13 23:45:46 lukav-desktop sshd\[8443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.207.191  user=root
2020-08-14 05:33:29
101.229.85.98 attackbots
Unauthorized connection attempt from IP address 101.229.85.98 on Port 445(SMB)
2020-08-14 05:57:29
218.92.0.145 attack
Aug 14 02:38:18 gw1 sshd[20444]: Failed password for root from 218.92.0.145 port 16571 ssh2
Aug 14 02:38:32 gw1 sshd[20444]: error: maximum authentication attempts exceeded for root from 218.92.0.145 port 16571 ssh2 [preauth]
...
2020-08-14 05:43:51
220.133.240.189 attackspambots
Attempted connection to port 23.
2020-08-14 05:48:08
213.87.44.152 attackspambots
Aug 13 22:43:46 pve1 sshd[2287]: Failed password for root from 213.87.44.152 port 41260 ssh2
...
2020-08-14 05:40:14

最近上报的IP列表

120.34.165.170 120.34.160.218 120.29.77.78 120.29.68.193
120.29.76.179 120.34.17.212 120.29.86.118 120.34.173.226
120.29.225.109 120.34.199.108 120.29.154.90 120.34.199.134
120.34.199.29 120.34.199.247 120.34.199.83 161.79.222.187
120.34.252.178 120.34.252.163 120.34.252.188 120.34.252.166